Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1 - 25 of 74

IMPPY3D: Image Processing in Python for 3D Image Stacks

April 2, 2025
Author(s)
Newell Moser, Alexander Landauer, Orion Kafka
Image Processing in Python for 3D image stacks, or IMPPY3D, is a free and open-source software (FOSS) repository that simplifies post-processing and 3D shape characterization for grayscale image stacks, otherwise known as volumetric images, 3D images, or

Software Metrics: Impossible, but Doable

January 22, 2025
Author(s)
Paul Black
Software metrics are theoretically impossible. However, there is tremendous benefit if we can assess properties of computerized systems. We review the elements that make it hard to computerized systems, in contrast with Civil Engineering or physical

Reliability in Building Blocks for Secure Software

December 5, 2024
Author(s)
Paul Black
In February 2024 the U.S. White House Office of the National Cyber Director (ONCD) released "Back to the Building Blocks: A Path Toward Secure and Measurable Software.'' The report makes the case that the technical community can greatly improve

Enhancing Network Data Plane Analysis with Native Graph Database

July 3, 2024
Author(s)
Amar Abane, Abdella Battou, Mheni Merzouki
As modern networks grow in complexity, ensuring their reliability and security becomes increasingly vital. Data plane analysis is a key process for verifying network behavior, but traditional data plane analysis tools face challenges in extensibility

A Smart Network Repository Based on Graph Database

January 25, 2024
Author(s)
Amar Abane, Abdella Battou, Mheni Merzouki, Tao Zhang
To address the increasing complexity of network management and the limitations of data repositories in handling the various network operational data, this paper proposes a novel repository design that uniformly represents network operational data while

O-RAN with Machine Learning in ns-3

December 11, 2023
Author(s)
Wesley Garey, Tanguy Ropitault, Richard A. Rouil, Evan Black, Weichao Gao
The Open Radio Access Network (O-RAN) Alliance is an industryled standardization effort, with the main objective of evolving the Radio Access Network (RAN) to be open, intelligent, interoperable, and autonomous to support the ever growing need of improved

Bug, Fault, Error, Weakness, or Vulnerability - Poster

November 7, 2023
Author(s)
Irena Bojanova
Motivation: Software security vulnerabilities are leveraged to attack cyberspace and critical infrastructure, leading to security failures. When communicating about them, however, even security experts might conflate essential related software concepts

Bugs Framework (BF) - Poster

November 7, 2023
Author(s)
Irena Bojanova
Motivation: Crucial need of a formal classification system allowing unambiguous specification of software security bugs and weaknesses, and the vulnerabilities that exploit them. Objective: Create bug models, weakness taxonomies, and vulnerability models

Labeling Software Security Vulnerabilities - Poster

November 7, 2023
Author(s)
Irena Bojanova, John Guerrerio
Motivation: Crucial need for systematic comprehensive labeling of the more than 228 000 publicly disclosed cybersecurity CVE vulnerabilities to enable advances in modern AI cybersecurity research. Objective: Utilize the Bugs Framework (BF) formalism for BF

Labeling Software Security Vulnerabilities

October 1, 2023
Author(s)
Irena Bojanova, John Guerrerio
Labeling software security vulnerabilities would benefit greatly modern artificial intelligence cybersecurity research. The National Vulnerability Database (NVD) partially achieves this via assignment of Common Weakness Enumeration (CWE) entries to Common

Understanding Stablecoin Technology and Related Security Considerations

September 5, 2023
Author(s)
Peter Mell, Dylan Yaga
Stablecoins are cryptocurrencies whose price is pegged to that of another asset (typically one with low price volatility). The market for stablecoins has grown tremendously – up to almost $200 billion USD in 2022. These coins are being used extensively in

The 2022 NIST Language Recognition Evaluation

February 28, 2023
Author(s)
Yooyoung Lee, Craig Greenberg, Asad Butt, Eliot Godard, Elliot Singer, Trang Nguyen, Lisa Mason, Douglas Reynolds
In 2022, the U.S. National Institute of Standards and Technology (NIST) conducted a Language Recognition Evaluation (LRE), which was the latest in an ongoing series of language detection evaluations administered by NIST since 1996. The LREs measure how

Impact of Code Complexity On Software Analysis

February 23, 2023
Author(s)
Charles D. De Oliveira, Elizabeth Fong, Paul E. Black
The Software Assurance Metrics and Tool Evaluation (SAMATE) team studied thousands of warnings from static analyzers. Tools have difficulty distinguishing between the absence of a weakness and the presence of a weakness that is buried in otherwise

Encouraging and Enabling Mutual Ownership in a RSE Community of Practice

November 21, 2022
Author(s)
Miranda Mundt, Jonathan Bisila, Jonathan E. Guyer, Daniel Howard, Daniel S. Katz, Reed Milewicz, Henry Schreiner, Joshua Teves, Chris Wiswell
The explosion of Research Software Engineers (RSEs) in the United States created the opportunity to form communities of practice (CoP), groups which share a passion for an activity and learn how to do it better as they interact regularly, specifically to

Efficient Parameter Exploration of Simulation Studies

November 18, 2022
Author(s)
Megan Olsen, M S Raunak
Simulation is a useful and effective way to analyze and study complex, real-world systems. It allows researchers, practitioners, and decision makers to make sense of the inner working of a system that involves many factors often resulting in some sort of

Metamorphic Testing for Hybrid Simulation Validation

October 5, 2021
Author(s)
Mohammed Farhan, Caroline Krejci, Megan Olsen, M S Raunak
Proper validation of a simulation model is essential to have confidence on its accuracy and credibility. However, many of the most effective approaches for simulation validation require access to data that may not always be available. Metamorphic Testing

Quantifying Variability in Microscopy Image Analyses for COVID-19 Drug Discovery

June 25, 2021
Author(s)
Peter Bajcsy, Mylene Simon, Sunny Yu, Nick Schaub, Jayapriya Nagarajan, Sudharsan Prativadi, Mohamed Ouladi, Nathan Hotaling
Microscopy image-based measurement variability in high-throughput imaging experiments for biological drug discoveries, such as COVID-19 therapies was addressed in this study. Variability of measurements came from (1) computational approaches (methods), (2)
Was this page helpful?